Internet voting systems too insecure, researcher warns
Says election officials should ditch 'Net voting for this year's general elections
Computerworld - SAN FRANCISCO -- Internet voting systems are inherently insecure and should not be allowed in the upcoming general elections, a noted security researcher said at the RSA Conference 2012 being held here this week.
David Jefferson, a computer scientist at Lawrence Livermore National Laboratories and chairman of the election watchdog group Verified Voting, called on election officials around the country to drop plans to allow an estimated 3.5 million voters to cast their ballots over the Internet in this year's general elections.
In an interview with Computerworld on Wednesday, Jefferson warned that the systems that enable such voting are far too insecure to be trusted and should be jettisoned altogether.
Jefferson is scheduled to participate in a panel discussion on the topic at the RSA conference on Thursday. Also on the panel are noted cryptographer and security guru Ron Rivest, who is the "R" in RSA, and Alex Halderman, an academic whose research on security vulnerabilities in e-voting systems prompted elections officials in Washington to drop plans to use an e-voting system in 2010.
"There's a wave of interest across the country, mostly among election officials and one agency of the [Department of Defense], to offer Internet voting" to overseas citizens and members of the military, Jefferson said. "From a security point of view, it is an insane thing to do."
A total of 33 states allow citizens to use the Internet to cast their ballots. In a majority of cases, those eligible to vote over the Internet receive their blank ballots over the Web, fill them in and submit their ballots via email as a PDF attachment. Some states, such as Arizona, have begun piloting projects that allow eligible voters to log in to a web portal, authenticate themselves and submit their ballots via the portal.
The insecurity and the inability to audit such voting practices are unacceptable, Jefferson said.
Ballots sent via email, for instance, are transmitted in the clear without encryption. That means any entity, such as an ISP or a malicious hacker that sits between the voter and the county where the vote is being cast, can view, filter, substitute or modify the ballot, he said.
Meanwhile, the e-voting Web portals that have been proposed for use in Arizona and are being tested in other states are prone to all the security vulnerabilities and attacks that other sites face, he said.
As one example, he pointed to a 2010 attack crafted by Halderman, an assistant professor of computer science at the University of Michigan, against a Digital Vote by Mail System that was proposed for use in Washington. The system was designed to be used by overseas voters and military personnel based in other countries.
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security File sync and share can increase productivity, but how do you pick a solution that works for you? Download to learn some important...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!